[前][次][番号順一覧][スレッド一覧]

ruby-changes:22456

From: nobu <ko1@a...>
Date: Thu, 9 Feb 2012 12:25:24 +0900 (JST)
Subject: [ruby-changes:22456] nobu:r34505 (trunk, ruby_1_9_3): * remove trailing spaces.

nobu	2012-02-09 12:25:07 +0900 (Thu, 09 Feb 2012)

  New Revision: 34505

  http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=rev&revision=34505

  Log:
    * remove trailing spaces.

  Modified files:
    branches/ruby_1_9_3/ext/bigdecimal/bigdecimal.c
    branches/ruby_1_9_3/ext/openssl/ossl_asn1.c
    branches/ruby_1_9_3/ext/openssl/ossl_cipher.c
    branches/ruby_1_9_3/ext/openssl/ossl_digest.c
    branches/ruby_1_9_3/ext/openssl/ossl_engine.c
    branches/ruby_1_9_3/ext/openssl/ossl_x509name.c
    branches/ruby_1_9_3/ext/readline/readline.c
    branches/ruby_1_9_3/ext/socket/ancdata.c
    branches/ruby_1_9_3/io.c
    trunk/ChangeLog
    trunk/ext/openssl/ossl_cipher.c
    trunk/ext/openssl/ossl_x509name.c

Index: ChangeLog
===================================================================
--- ChangeLog	(revision 34504)
+++ ChangeLog	(revision 34505)
@@ -46,9 +46,9 @@
 
 	* ext/openssl/ossl_x509name.c: Use the numerical representation of
 	  unrecognized OIDs instead of the sn "UNDEF".
-	  
+
 	* test/openssl/test_x509name.rb: Add tests for the fixed behavior.
-	  
+
 	  Patch provided by Paul Kehrer, thank you!
 	  [ruby-core:41769] [Feature #5787]
 
Index: ext/openssl/ossl_cipher.c
===================================================================
--- ext/openssl/ossl_cipher.c	(revision 34504)
+++ ext/openssl/ossl_cipher.c	(revision 34505)
@@ -337,7 +337,7 @@
  *  Encrypts data in a streaming fashion. Hand consecutive blocks of data
  *  to the +update+ method in order to encrypt it. Returns the encrypted
  *  data chunk. When done, the output of Cipher#final should be additionally
- *  added to the result. 
+ *  added to the result.
  *
  *  === Parameters
  *  +data+ is a nonempty string.
@@ -690,7 +690,7 @@
      *  as an IV. There are elaborate ways how an attacker can take advantage
      *  of such an IV. As a general rule of thumb, exposing the key directly
      *  or indirectly should be avoided at all cost and exceptions only be
-     *  made with good reason. 
+     *  made with good reason.
      *
      * === Calling Cipher#final
      *
Index: ext/openssl/ossl_x509name.c
===================================================================
--- ext/openssl/ossl_x509name.c	(revision 34504)
+++ ext/openssl/ossl_x509name.c	(revision 34505)
@@ -253,7 +253,7 @@
 	    short_name = OBJ_nid2sn(nid);
 	    vname = rb_str_new2(short_name); /*do not free*/
 	}
-	ary = rb_ary_new3(3, 
+	ary = rb_ary_new3(3,
 			  vname,
         		  rb_str_new((const char *)entry->value->data, entry->value->length),
         		  INT2FIX(entry->value->type));
Index: ruby_1_9_3/io.c
===================================================================
--- ruby_1_9_3/io.c	(revision 34504)
+++ ruby_1_9_3/io.c	(revision 34505)
@@ -5500,7 +5500,7 @@
  *  be passed the opened +file+ as an argument, and the File object will
  *  automatically be closed when the block terminates.  In this instance,
  *  <code>File.open</code> returns the value of the block.
- *  
+ *
  *  See IO.new for a list of values for the +opt+ parameter.
  */
 
Index: ruby_1_9_3/ext/bigdecimal/bigdecimal.c
===================================================================
--- ruby_1_9_3/ext/bigdecimal/bigdecimal.c	(revision 34504)
+++ ruby_1_9_3/ext/bigdecimal/bigdecimal.c	(revision 34505)
@@ -4335,7 +4335,7 @@
         VpAsgn(c, a, VpGetSign(b));
         VpSetZero(r,VpGetSign(a));
         goto Exit;
-    } 
+    }
 
     word_a = a->Prec;
     word_b = b->Prec;
Index: ruby_1_9_3/ext/readline/readline.c
===================================================================
--- ruby_1_9_3/ext/readline/readline.c	(revision 34504)
+++ ruby_1_9_3/ext/readline/readline.c	(revision 34505)
@@ -166,7 +166,7 @@
             }
         }
     }
-#endif    
+#endif
     c = rb_funcall(readline_instream, id_getbyte, 0, 0);
     if (NIL_P(c)) return EOF;
     return NUM2CHR(c);
Index: ruby_1_9_3/ext/openssl/ossl_engine.c
===================================================================
--- ruby_1_9_3/ext/openssl/ossl_engine.c	(revision 34504)
+++ ruby_1_9_3/ext/openssl/ossl_engine.c	(revision 34505)
@@ -118,7 +118,7 @@
 	/* Need a ref count of two here because of ENGINE_free being
 	 * called internally by OpenSSL when moving to the next ENGINE
 	 * and by us when releasing the ENGINE reference */
-	ENGINE_up_ref(e); 
+	ENGINE_up_ref(e);
 	WrapEngine(klass, obj, e);
         rb_ary_push(ary, obj);
     }
Index: ruby_1_9_3/ext/openssl/ossl_cipher.c
===================================================================
--- ruby_1_9_3/ext/openssl/ossl_cipher.c	(revision 34504)
+++ ruby_1_9_3/ext/openssl/ossl_cipher.c	(revision 34505)
@@ -337,7 +337,7 @@
  *  Encrypts data in a streaming fashion. Hand consecutive blocks of data
  *  to the +update+ method in order to encrypt it. Returns the encrypted
  *  data chunk. When done, the output of Cipher#final should be additionally
- *  added to the result. 
+ *  added to the result.
  *
  *  === Parameters
  *  +data+ is a nonempty string.
@@ -690,7 +690,7 @@
      *  as an IV. There are elaborate ways how an attacker can take advantage
      *  of such an IV. As a general rule of thumb, exposing the key directly
      *  or indirectly should be avoided at all cost and exceptions only be
-     *  made with good reason. 
+     *  made with good reason.
      *
      * === Calling Cipher#final
      *
Index: ruby_1_9_3/ext/openssl/ossl_digest.c
===================================================================
--- ruby_1_9_3/ext/openssl/ossl_digest.c	(revision 34504)
+++ ruby_1_9_3/ext/openssl/ossl_digest.c	(revision 34505)
@@ -409,7 +409,7 @@
      *   data1 = File.read('file1')
      *   sha256 = OpenSSL::Digest::SHA256.new
      *   digest1 = sha256.digest(data1)
-     *   
+     *
      *   data2 = File.read('file2')
      *   sha256.reset
      *   digest2 = sha256.digest(data2)
Index: ruby_1_9_3/ext/openssl/ossl_asn1.c
===================================================================
--- ruby_1_9_3/ext/openssl/ossl_asn1.c	(revision 34504)
+++ ruby_1_9_3/ext/openssl/ossl_asn1.c	(revision 34505)
@@ -869,7 +869,7 @@
 	rb_ary_push(ary, value);
 	if (length > 0)
 	    length -= inner_read;
-	
+
 	if (infinite &&
 	    NUM2INT(ossl_asn1_get_tag(value)) == V_ASN1_EOC &&
 	    SYM2ID(ossl_asn1_get_tag_class(value)) == sUNIVERSAL) {
Index: ruby_1_9_3/ext/openssl/ossl_x509name.c
===================================================================
--- ruby_1_9_3/ext/openssl/ossl_x509name.c	(revision 34504)
+++ ruby_1_9_3/ext/openssl/ossl_x509name.c	(revision 34505)
@@ -253,7 +253,7 @@
 	    short_name = OBJ_nid2sn(nid);
 	    vname = rb_str_new2(short_name); /*do not free*/
 	}
-	ary = rb_ary_new3(3, 
+	ary = rb_ary_new3(3,
 			  vname,
         		  rb_str_new((const char *)entry->value->data, entry->value->length),
         		  INT2FIX(entry->value->type));
Index: ruby_1_9_3/ext/socket/ancdata.c
===================================================================
--- ruby_1_9_3/ext/socket/ancdata.c	(revision 34504)
+++ ruby_1_9_3/ext/socket/ancdata.c	(revision 34505)
@@ -1380,7 +1380,7 @@
 discard_cmsg(struct cmsghdr *cmh, char *msg_end, int msg_peek_p)
 {
 # if !defined(FD_PASSING_WORK_WITH_RECVMSG_MSG_PEEK)
-    /* 
+    /*
      * FreeBSD 8.2.0, NetBSD 5 and MacOS X Snow Leopard doesn't
      * allocate fds by recvmsg with MSG_PEEK.
      * [ruby-dev:44189]

--
ML: ruby-changes@q...
Info: http://www.atdot.net/~ko1/quickml/

[前][次][番号順一覧][スレッド一覧]